Binary
stringlengths
25
43
Addr
stringlengths
8
8
Name
stringlengths
5
187
Type
int64
0
1
Disassembly
stringlengths
16
68.6k
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402410
__SEH_prolog4
0
L1: 68 89 24 40 00 ?? push function 0x00402489 64 ff 35 00 00 00 00 ?? push dword fs:[0] 8b 44 24 10 ?? mov eax, dword ss:[esp + 0x10<16>] 89 6c 24 10 ?? mov dword ss:[esp + 0x10<16>], ebp 8d 6c 24 10 ?? lea ebp, ss:[esp + 0x10<16>] 2b e0 ?? sub esp, eax 53 ?? push ebx 56 ?? push esi 57 ?? push edi a1 18 70 40 00 ?? mov eax, dword ds:[0x00407018] 31 45 fc ?? xor dword ss:[ebp + 0xfc<252,-4>], eax 33 c5 ?? xor eax, ebp 50 ?? push eax 89 65 e8 ?? mov dword ss:[ebp + 0xe8<232,-24>], esp ff 75 f8 ?? push dword ss:[ebp + 0xf8<248,-8>] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 8d 45 f0 ?? lea eax, ss:[ebp + 0xf0<240,-16>] 64 a3 00 00 00 00 ?? mov dword fs:[0], eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402470
__SEH_epilog4
0
L1: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx 8b e5 ?? mov esp, ebp 5d ?? pop ebp 51 ?? push ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402489
__except_handler4
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] ff 36 ?? push dword ds:[esi] e8 c1 ed ff ff ?? call function 0x00401258 L2: ff 75 14 ?? push dword ss:[ebp + 0x14<20>] 89 06 ?? mov dword ds:[esi], eax ff 75 10 ?? push dword ss:[ebp + 0x10<16>] ff 75 0c ?? push dword ss:[ebp + 12] 56 ?? push esi 68 04 11 40 00 ?? push 0x00401104 68 18 70 40 00 ?? push 0x00407018 e8 61 09 00 00 ?? call function 0x00402e13 L3: 83 c4 1c ?? add esp, 0x1c<28> 5e ?? pop esi 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x4024c3
@_guard_check_icall_nop@4
0
L1: c2 00 00 ?? ret 0
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x4024c6
_ReadNoFence
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 00 ?? mov eax, dword ds:[eax] 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x4024d2
_ReadPointerNoFence
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 8b 00 ?? mov eax, dword ds:[eax] 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x4024de
__InlineInterlockedExchangePointer
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 87 01 ?? xchg dword ds:[ecx], eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x4024ee
___castguard_check_failure_debugbreak
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] ba 40 5e 40 00 ?? mov edx, 0x00405e40 b9 80 5f 40 00 ?? mov ecx, 0x00405f80 2b c2 ?? sub eax, edx 2b ca ?? sub ecx, edx 3b c1 ?? cmp eax, ecx 77 01 ?? ja basic block L3 L2: cc ?? int3 L3: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x40250f
___castguard_check_failure_fastfail
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] ba 40 5e 40 00 ?? mov edx, 0x00405e40 b9 80 5f 40 00 ?? mov ecx, 0x00405f80 2b c2 ?? sub eax, edx 2b ca ?? sub ecx, edx 3b c1 ?? cmp eax, ecx 77 05 ?? ja basic block L3 L2: 6a 41 ?? push 0x41<65> 59 ?? pop ecx cd 29 ?? int 0x29<41> L3: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402535
___castguard_check_failure_nop
0
L1: c2 00 00 ?? ret 0
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402538
___castguard_check_failure_os_handled
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] ba 40 5e 40 00 ?? mov edx, 0x00405e40 b9 80 5f 40 00 ?? mov ecx, 0x00405f80 2b c2 ?? sub eax, edx 2b ca ?? sub ecx, edx 3b c1 ?? cmp eax, ecx 77 11 ?? ja basic block L4 L2: 83 3d 08 90 40 00 00 ?? cmp dword ds:[0x00409008], 0 74 08 ?? je basic block L4 L3: a1 08 90 40 00 ?? mov eax, dword ds:[0x00409008] 5d ?? pop ebp ff e0 ?? jmp eax L4: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x40256d
__castguard_check_failure_os_handled_wrapper
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 3d 08 90 40 00 00 ?? cmp dword ds:[0x00409008], 0 74 08 ?? je basic block L3 L2: a1 08 90 40 00 ?? mov eax, dword ds:[0x00409008] 5d ?? pop ebp ff e0 ?? jmp eax L3: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402588
___castguard_check_failure_user_handled
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] ba 40 5e 40 00 ?? mov edx, 0x00405e40 b9 80 5f 40 00 ?? mov ecx, 0x00405f80 2b c2 ?? sub eax, edx 2b ca ?? sub ecx, edx 3b c1 ?? cmp eax, ecx 77 1a ?? ja basic block L7 L2: 56 ?? push esi 8b 35 28 74 40 00 ?? mov esi, dword ds:[0x00407428] 85 f6 ?? test esi, esi 74 0e ?? je basic block L6 L3: ff 75 08 ?? push dword ss:[ebp + 8] 8b ce ?? mov ecx, esi ff 15 00 90 40 00 ?? call dword ds:[0x00409000] L4: ff d6 ?? call esi L5: 59 ?? pop ecx L6: 5e ?? pop esi L7: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x4025c9
__castguard_check_failure_user_handled_wrapper
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b 35 28 74 40 00 ?? mov esi, dword ds:[0x00407428] 85 f6 ?? test esi, esi 74 0e ?? je basic block L5 L2: ff 75 08 ?? push dword ss:[ebp + 8] 8b ce ?? mov ecx, esi ff 15 00 90 40 00 ?? call dword ds:[0x00409000] L3: ff d6 ?? call esi L4: 59 ?? pop ecx L5: 5e ?? pop esi 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x4025ef
__castguard_compat_check
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] ba 40 5e 40 00 ?? mov edx, 0x00405e40 b9 80 5f 40 00 ?? mov ecx, 0x00405f80 2b c2 ?? sub eax, edx 2b ca ?? sub ecx, edx 3b c8 ?? cmp ecx, eax 1b c0 ?? sbb eax, eax 40 ?? inc eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402610
___castguard_set_user_handler
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] b9 28 74 40 00 ?? mov ecx, 0x00407428 87 01 ?? xchg dword ds:[ecx], eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402622
___castguard_slow_path_check_debugbreak
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 8b c1 ?? mov eax, ecx 2b 45 0c ?? sub eax, dword ss:[ebp + 12] 2d 00 5e 40 00 ?? sub eax, 0x00405e00 83 e8 40 ?? sub eax, 0x40<64> 3b 45 10 ?? cmp eax, dword ss:[ebp + 0x10<16>] 76 13 ?? jbe basic block L4 L2: ba 40 5e 40 00 ?? mov edx, 0x00405e40 b8 80 5f 40 00 ?? mov eax, 0x00405f80 2b ca ?? sub ecx, edx 2b c2 ?? sub eax, edx 3b c8 ?? cmp ecx, eax 77 01 ?? ja basic block L4 L3: cc ?? int3 L4: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x40265a
___castguard_slow_path_check_fastfail
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 8b c1 ?? mov eax, ecx 2b 45 0c ?? sub eax, dword ss:[ebp + 12] 2d 00 5e 40 00 ?? sub eax, 0x00405e00 83 e8 40 ?? sub eax, 0x40<64> 3b 45 10 ?? cmp eax, dword ss:[ebp + 0x10<16>] 76 17 ?? jbe basic block L4 L2: ba 40 5e 40 00 ?? mov edx, 0x00405e40 b8 80 5f 40 00 ?? mov eax, 0x00405f80 2b ca ?? sub ecx, edx 2b c2 ?? sub eax, edx 3b c8 ?? cmp ecx, eax 77 05 ?? ja basic block L4 L3: 6a 41 ?? push 0x41<65> 59 ?? pop ecx cd 29 ?? int 0x29<41> L4: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402697
___castguard_slow_path_check_nop
0
L1: c2 00 00 ?? ret 0
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x40269a
___castguard_slow_path_check_os_handled
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 2b 45 0c ?? sub eax, dword ss:[ebp + 12] 2d 00 5e 40 00 ?? sub eax, 0x00405e00 83 e8 40 ?? sub eax, 0x40<64> 3b 45 10 ?? cmp eax, dword ss:[ebp + 0x10<16>] 76 29 ?? jbe basic block L6 L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] ba 40 5e 40 00 ?? mov edx, 0x00405e40 b8 80 5f 40 00 ?? mov eax, 0x00405f80 2b ca ?? sub ecx, edx 2b c2 ?? sub eax, edx 3b c8 ?? cmp ecx, eax 77 14 ?? ja basic block L6 L3: 83 3d 08 90 40 00 00 ?? cmp dword ds:[0x00409008], 0 74 0b ?? je basic block L6 L4: ff 75 08 ?? push dword ss:[ebp + 8] a1 08 90 40 00 ?? mov eax, dword ds:[0x00409008] ff d0 ?? call eax L5: 59 ?? pop ecx L6: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x4026eb
___castguard_slow_path_check_user_handled
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 2b 45 0c ?? sub eax, dword ss:[ebp + 12] 2d 00 5e 40 00 ?? sub eax, 0x00405e00 83 e8 40 ?? sub eax, 0x40<64> 3b 45 10 ?? cmp eax, dword ss:[ebp + 0x10<16>] 76 2f ?? jbe basic block L8 L2: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] ba 40 5e 40 00 ?? mov edx, 0x00405e40 b8 80 5f 40 00 ?? mov eax, 0x00405f80 2b ca ?? sub ecx, edx 2b c2 ?? sub eax, edx 3b c8 ?? cmp ecx, eax 77 1a ?? ja basic block L8 L3: 56 ?? push esi 8b 35 28 74 40 00 ?? mov esi, dword ds:[0x00407428] 85 f6 ?? test esi, esi 74 0e ?? je basic block L7 L4: ff 75 08 ?? push dword ss:[ebp + 8] 8b ce ?? mov ecx, esi ff 15 00 90 40 00 ?? call dword ds:[0x00409000] L5: ff d6 ?? call esi L6: 59 ?? pop ecx L7: 5e ?? pop esi L8: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402743
__castguard_slow_path_compat_check
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 2b 45 0c ?? sub eax, dword ss:[ebp + 12] 2d 00 5e 40 00 ?? sub eax, 0x00405e00 83 e8 40 ?? sub eax, 0x40<64> 39 45 10 ?? cmp dword ss:[ebp + 0x10<16>], eax 1b c0 ?? sbb eax, eax f7 d8 ?? neg eax 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402763
__guard_icall_checks_enforced
0
L1: 8b 0d 00 90 40 00 ?? mov ecx, dword ds:[0x00409000] 33 c0 ?? xor eax, eax 81 f9 a9 11 40 00 ?? cmp ecx, 0x004011a9 0f 95 c0 ?? setne al c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402779
??1type_info@@UAE@XZ
1
L1: c7 01 ac 5b 40 00 ?? mov dword ds:[ecx], 0x00405bac c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402780
??_Etype_info@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 ac 5b 40 00 ?? mov dword ds:[esi], 0x00405bac 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 b6 e8 ff ff ?? call function 0x00401050 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402780
??_Gtype_info@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp f6 45 08 01 ?? test byte ss:[ebp + 8], 1 56 ?? push esi 8b f1 ?? mov esi, ecx c7 06 ac 5b 40 00 ?? mov dword ds:[esi], 0x00405bac 74 0a ?? je basic block L4 L2: 6a 0c ?? push 12 56 ?? push esi e8 b6 e8 ff ff ?? call function 0x00401050 L3: 59 ?? pop ecx 59 ?? pop ecx L4: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x4027ab
___isa_available_init
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 25 2c 74 40 00 00 ?? and dword ds:[0x0040742c], 0 83 ec 24 ?? sub esp, 0x24<36> 83 0d 10 70 40 00 01 ?? or dword ds:[0x00407010], 1 6a 0a ?? push 10 ff 15 2c 80 40 00 ?? call dword ds:[0x0040802c] L2: 85 c0 ?? test eax, eax 0f 84 ac 01 00 00 ?? je basic block L25 L3: 83 65 f0 00 ?? and dword ss:[ebp + 0xf0<240,-16>], 0 33 c0 ?? xor eax, eax 53 ?? push ebx 56 ?? push esi 57 ?? push edi 33 c9 ?? xor ecx, ecx 8d 7d dc ?? lea edi, ss:[ebp + 0xdc<220,-36>] 53 ?? push ebx 0f a2 ?? cpuid 8b f3 ?? mov esi, ebx 5b ?? pop ebx 90 ?? nop 89 07 ?? mov dword ds:[edi], eax 89 77 04 ?? mov dword ds:[edi + 4], esi 89 4f 08 ?? mov dword ds:[edi + 8], ecx 33 c9 ?? xor ecx, ecx 89 57 0c ?? mov dword ds:[edi + 12], edx 8b 45 dc ?? mov eax, dword ss:[ebp + 0xdc<220,-36>] 8b 7d e0 ?? mov edi, dword ss:[ebp + 0xe0<224,-32>] 89 45 f4 ?? mov dword ss:[ebp + 0xf4<244,-12>], eax 81 f7 47 65 6e 75 ?? xor edi, 0x756e6547 8b 45 e8 ?? mov eax, dword ss:[ebp + 0xe8<232,-24>] 35 69 6e 65 49 ?? xor eax, 0x49656e69 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax 8b 45 e4 ?? mov eax, dword ss:[ebp + 0xe4<228,-28>] 35 6e 74 65 6c ?? xor eax, 0x6c65746e 89 45 f8 ?? mov dword ss:[ebp + 0xf8<248,-8>], eax 33 c0 ?? xor eax, eax 40 ?? inc eax 53 ?? push ebx 0f a2 ?? cpuid 8b f3 ?? mov esi, ebx 5b ?? pop ebx 90 ?? nop 8d 5d dc ?? lea ebx, ss:[ebp + 0xdc<220,-36>] 89 03 ?? mov dword ds:[ebx], eax 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 0b 45 f8 ?? or eax, dword ss:[ebp + 0xf8<248,-8>] 0b c7 ?? or eax, edi 89 73 04 ?? mov dword ds:[ebx + 4], esi 89 4b 08 ?? mov dword ds:[ebx + 8], ecx 89 53 0c ?? mov dword ds:[ebx + 12], edx 75 43 ?? jne basic block L11 L4: 8b 45 dc ?? mov eax, dword ss:[ebp + 0xdc<220,-36>] 25 f0 3f ff 0f ?? and eax, 0x0fff3ff0 3d c0 06 01 00 ?? cmp eax, 0x000106c0 74 23 ?? je basic block L10 L5: 3d 60 06 02 00 ?? cmp eax, 0x00020660 74 1c ?? je basic block L10 L6: 3d 70 06 02 00 ?? cmp eax, 0x00020670 74 15 ?? je basic block L10 L7: 3d 50 06 03 00 ?? cmp eax, 0x00030650 74 0e ?? je basic block L10 L8: 3d 60 06 03 00 ?? cmp eax, 0x00030660 74 07 ?? je basic block L10 L9: 3d 70 06 03 00 ?? cmp eax, 0x00030670 75 11 ?? jne basic block L11 L10: 8b 3d 30 74 40 00 ?? mov edi, dword ds:[0x00407430] 83 cf 01 ?? or edi, 1 89 3d 30 74 40 00 ?? mov dword ds:[0x00407430], edi eb 06 ?? jmp basic block L12 L11: 8b 3d 30 74 40 00 ?? mov edi, dword ds:[0x00407430] L12: 8b 4d e4 ?? mov ecx, dword ss:[ebp + 0xe4<228,-28>] 6a 07 ?? push 7 58 ?? pop eax 89 4d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], ecx 39 45 f4 ?? cmp dword ss:[ebp + 0xf4<244,-12>], eax 7c 30 ?? jl basic block L15 L13: 33 c9 ?? xor ecx, ecx 53 ?? push ebx 0f a2 ?? cpuid 8b f3 ?? mov esi, ebx 5b ?? pop ebx 90 ?? nop 8d 5d dc ?? lea ebx, ss:[ebp + 0xdc<220,-36>] 89 03 ?? mov dword ds:[ebx], eax 89 73 04 ?? mov dword ds:[ebx + 4], esi 89 4b 08 ?? mov dword ds:[ebx + 8], ecx 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 89 53 0c ?? mov dword ds:[ebx + 12], edx 8b 5d e0 ?? mov ebx, dword ss:[ebp + 0xe0<224,-32>] f7 c3 00 02 00 00 ?? test ebx, 0x00000200<512> 74 0e ?? je basic block L16 L14: 83 cf 02 ?? or edi, 2 89 3d 30 74 40 00 ?? mov dword ds:[0x00407430], edi eb 03 ?? jmp basic block L16 L15: 8b 5d f0 ?? mov ebx, dword ss:[ebp + 0xf0<240,-16>] L16: a1 10 70 40 00 ?? mov eax, dword ds:[0x00407010] 83 c8 02 ?? or eax, 2 c7 05 2c 74 40 00 01 00 ?? mov dword ds:[0x0040742c], 1 00 00 a3 10 70 40 00 ?? mov dword ds:[0x00407010], eax f7 c1 00 00 10 00 ?? test ecx, 0x00100000 0f 84 93 00 00 00 ?? je basic block L24 L17: 83 c8 04 ?? or eax, 4 c7 05 2c 74 40 00 02 00 ?? mov dword ds:[0x0040742c], 2 00 00 a3 10 70 40 00 ?? mov dword ds:[0x00407010], eax f7 c1 00 00 00 08 ?? test ecx, 0x08000000 74 79 ?? je basic block L24 L18: f7 c1 00 00 00 10 ?? test ecx, 0x10000000 74 71 ?? je basic block L24 L19: 33 c9 ?? xor ecx, ecx 0f 01 d0 ?? xgetbv 89 45 ec ?? mov dword ss:[ebp + 0xec<236,-20>], eax 89 55 f0 ?? mov dword ss:[ebp + 0xf0<240,-16>], edx 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 6a 06 ?? push 6 5e ?? pop esi 23 c6 ?? and eax, esi 3b c6 ?? cmp eax, esi 75 57 ?? jne basic block L24 L20: a1 10 70 40 00 ?? mov eax, dword ds:[0x00407010] 83 c8 08 ?? or eax, 8 c7 05 2c 74 40 00 03 00 ?? mov dword ds:[0x0040742c], 3 00 00 a3 10 70 40 00 ?? mov dword ds:[0x00407010], eax f6 c3 20 ?? test bl, 0x20<32> 74 3b ?? je basic block L24 L21: 83 c8 20 ?? or eax, 0x20<32> c7 05 2c 74 40 00 05 00 ?? mov dword ds:[0x0040742c], 5 00 00 a3 10 70 40 00 ?? mov dword ds:[0x00407010], eax b8 00 00 03 d0 ?? mov eax, 0xd0030000 23 d8 ?? and ebx, eax 3b d8 ?? cmp ebx, eax 75 1e ?? jne basic block L24 L22: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] ba e0 00 00 00 ?? mov edx, 0x000000e0<224> 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 23 c2 ?? and eax, edx 3b c2 ?? cmp eax, edx 75 0d ?? jne basic block L24 L23: 83 0d 10 70 40 00 40 ?? or dword ds:[0x00407010], 0x40<64> 89 35 2c 74 40 00 ?? mov dword ds:[0x0040742c], esi L24: 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx L25: 33 c0 ?? xor eax, eax c9 ?? leave c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x4029f4
___scrt_is_ucrt_dll_in_use
0
L1: 33 c0 ?? xor eax, eax 39 05 20 70 40 00 ?? cmp dword ds:[0x00407020], eax 0f 95 c0 ?? setne al c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402a03
@__security_check_cookie@4
0
L1: 3b 0d 18 70 40 00 ?? cmp ecx, dword ds:[0x00407018] 75 01 ?? jne basic block L3 L2: c3 ?? ret L3: e9 08 e6 ff ff ?? jmp 0x00401019 e9 28 1a 00 00 ?? jmp function 0x00402a46
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402a14
___raise_securityfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 00 ?? push 0 ff 15 1c 80 40 00 ?? call dword ds:[0x0040801c] L2: ff 75 08 ?? push dword ss:[ebp + 8] ff 15 18 80 40 00 ?? call dword ds:[0x00408018] L3: 68 09 04 00 c0 ?? push 0xc0000409 ff 15 24 80 40 00 ?? call dword ds:[0x00408024] L4: 50 ?? push eax ff 15 20 80 40 00 ?? call dword ds:[0x00408020] L5: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402a46
___report_gsfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 24 03 00 00 ?? sub esp, 0x00000324<804> 6a 17 ?? push 0x17<23> ff 15 2c 80 40 00 ?? call dword ds:[0x0040802c] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 6a 02 ?? push 2 59 ?? pop ecx cd 29 ?? int 0x29<41> L4: a3 38 75 40 00 ?? mov dword ds:[0x00407538], eax 89 0d 34 75 40 00 ?? mov dword ds:[0x00407534], ecx 89 15 30 75 40 00 ?? mov dword ds:[0x00407530], edx 89 1d 2c 75 40 00 ?? mov dword ds:[0x0040752c], ebx 89 35 28 75 40 00 ?? mov dword ds:[0x00407528], esi 89 3d 24 75 40 00 ?? mov dword ds:[0x00407524], edi 66 8c 15 50 75 40 00 ?? mov word ds:[0x00407550], ss 66 8c 0d 44 75 40 00 ?? mov word ds:[0x00407544], cs 66 8c 1d 20 75 40 00 ?? mov word ds:[0x00407520], ds 66 8c 05 1c 75 40 00 ?? mov word ds:[0x0040751c], es 66 8c 25 18 75 40 00 ?? mov word ds:[0x00407518], fs 66 8c 2d 14 75 40 00 ?? mov word ds:[0x00407514], gs 9c ?? pushfd 8f 05 48 75 40 00 ?? pop dword ds:[0x00407548] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 3c 75 40 00 ?? mov dword ds:[0x0040753c], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 40 75 40 00 ?? mov dword ds:[0x00407540], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 4c 75 40 00 ?? mov dword ds:[0x0040754c], eax 8b 85 dc fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffcdc<4294966492,-804>] c7 05 88 74 40 00 01 00 ?? mov dword ds:[0x00407488], 0x00010001 01 00 a1 40 75 40 00 ?? mov eax, dword ds:[0x00407540] a3 44 74 40 00 ?? mov dword ds:[0x00407444], eax c7 05 38 74 40 00 09 04 ?? mov dword ds:[0x00407438], 0xc0000409 00 c0 c7 05 3c 74 40 00 01 00 ?? mov dword ds:[0x0040743c], 1 00 00 c7 05 48 74 40 00 01 00 ?? mov dword ds:[0x00407448], 1 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 c7 80 4c 74 40 00 02 00 ?? mov dword ds:[eax + 0x0040744c], 2 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 0d 18 70 40 00 ?? mov ecx, dword ds:[0x00407018] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 6a 04 ?? push 4 58 ?? pop eax c1 e0 00 ?? shl eax, 0 8b 0d 14 70 40 00 ?? mov ecx, dword ds:[0x00407014] 89 4c 05 f8 ?? mov dword ss:[ebp + eax + 0xf8<248,-8>], ecx 68 b4 5b 40 00 ?? push 0x00405bb4<"8t@"> e8 33 e7 ff ff ?? call function 0x00401271 L5: c9 ?? leave c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402b7e
___report_rangecheckfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 6a 08 ?? push 8 e8 b7 e6 ff ff ?? call function 0x0040123f L2: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402b8d
___report_securityfailure
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 1c 03 00 00 ?? sub esp, 0x0000031c<796> 6a 17 ?? push 0x17<23> ff 15 2c 80 40 00 ?? call dword ds:[0x0040802c] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 38 75 40 00 ?? mov dword ds:[0x00407538], eax 89 0d 34 75 40 00 ?? mov dword ds:[0x00407534], ecx 89 15 30 75 40 00 ?? mov dword ds:[0x00407530], edx 89 1d 2c 75 40 00 ?? mov dword ds:[0x0040752c], ebx 89 35 28 75 40 00 ?? mov dword ds:[0x00407528], esi 89 3d 24 75 40 00 ?? mov dword ds:[0x00407524], edi 66 8c 15 50 75 40 00 ?? mov word ds:[0x00407550], ss 66 8c 0d 44 75 40 00 ?? mov word ds:[0x00407544], cs 66 8c 1d 20 75 40 00 ?? mov word ds:[0x00407520], ds 66 8c 05 1c 75 40 00 ?? mov word ds:[0x0040751c], es 66 8c 25 18 75 40 00 ?? mov word ds:[0x00407518], fs 66 8c 2d 14 75 40 00 ?? mov word ds:[0x00407514], gs 9c ?? pushfd 8f 05 48 75 40 00 ?? pop dword ds:[0x00407548] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 3c 75 40 00 ?? mov dword ds:[0x0040753c], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 40 75 40 00 ?? mov dword ds:[0x00407540], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 4c 75 40 00 ?? mov dword ds:[0x0040754c], eax 8b 85 e4 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce4<4294966500,-796>] a1 40 75 40 00 ?? mov eax, dword ds:[0x00407540] a3 44 74 40 00 ?? mov dword ds:[0x00407444], eax c7 05 38 74 40 00 09 04 ?? mov dword ds:[0x00407438], 0xc0000409 00 c0 c7 05 3c 74 40 00 01 00 ?? mov dword ds:[0x0040743c], 1 00 00 c7 05 48 74 40 00 01 00 ?? mov dword ds:[0x00407448], 1 00 00 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 88 4c 74 40 00 ?? mov dword ds:[eax + 0x0040744c], ecx 68 b4 5b 40 00 ?? push 0x00405bb4<"8t@"> e8 17 e6 ff ff ?? call function 0x00401271 L5: c9 ?? leave c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402c8f
___report_securityfailureEx
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 81 ec 20 03 00 00 ?? sub esp, 0x00000320<800> 6a 17 ?? push 0x17<23> ff 15 2c 80 40 00 ?? call dword ds:[0x0040802c] L2: 85 c0 ?? test eax, eax 74 05 ?? je basic block L4 L3: 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] cd 29 ?? int 0x29<41> L4: a3 38 75 40 00 ?? mov dword ds:[0x00407538], eax 89 0d 34 75 40 00 ?? mov dword ds:[0x00407534], ecx 89 15 30 75 40 00 ?? mov dword ds:[0x00407530], edx 89 1d 2c 75 40 00 ?? mov dword ds:[0x0040752c], ebx 89 35 28 75 40 00 ?? mov dword ds:[0x00407528], esi 89 3d 24 75 40 00 ?? mov dword ds:[0x00407524], edi 66 8c 15 50 75 40 00 ?? mov word ds:[0x00407550], ss 66 8c 0d 44 75 40 00 ?? mov word ds:[0x00407544], cs 66 8c 1d 20 75 40 00 ?? mov word ds:[0x00407520], ds 66 8c 05 1c 75 40 00 ?? mov word ds:[0x0040751c], es 66 8c 25 18 75 40 00 ?? mov word ds:[0x00407518], fs 66 8c 2d 14 75 40 00 ?? mov word ds:[0x00407514], gs 9c ?? pushfd 8f 05 48 75 40 00 ?? pop dword ds:[0x00407548] 8b 45 00 ?? mov eax, dword ss:[ebp + 0] a3 3c 75 40 00 ?? mov dword ds:[0x0040753c], eax 8b 45 04 ?? mov eax, dword ss:[ebp + 4] a3 40 75 40 00 ?? mov dword ds:[0x00407540], eax 8d 45 08 ?? lea eax, ss:[ebp + 8] a3 4c 75 40 00 ?? mov dword ds:[0x0040754c], eax 8b 85 e0 fc ff ff ?? mov eax, dword ss:[ebp + 0xfffffce0<4294966496,-800>] a1 40 75 40 00 ?? mov eax, dword ds:[0x00407540] a3 44 74 40 00 ?? mov dword ds:[0x00407444], eax c7 05 38 74 40 00 09 04 ?? mov dword ds:[0x00407438], 0xc0000409 00 c0 c7 05 3c 74 40 00 01 00 ?? mov dword ds:[0x0040743c], 1 00 00 83 7d 0c 00 ?? cmp dword ss:[ebp + 12], 0 76 0a ?? jbe basic block L7 L5: 83 7d 10 00 ?? cmp dword ss:[ebp + 0x10<16>], 0 75 04 ?? jne basic block L7 L6: 83 65 0c 00 ?? and dword ss:[ebp + 12], 0 L7: 83 7d 0c 0e ?? cmp dword ss:[ebp + 12], 14 76 07 ?? jbe basic block L9 L8: 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 48 ?? dec eax 89 45 0c ?? mov dword ss:[ebp + 12], eax L9: 8b 45 0c ?? mov eax, dword ss:[ebp + 12] 40 ?? inc eax a3 48 74 40 00 ?? mov dword ds:[0x00407448], eax 6a 04 ?? push 4 58 ?? pop eax 6b c0 00 ?? imul eax, eax, 0 8b 4d 08 ?? mov ecx, dword ss:[ebp + 8] 89 88 4c 74 40 00 ?? mov dword ds:[eax + 0x0040744c], ecx 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 eb 07 ?? jmp basic block L10 L10: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 3b 45 0c ?? cmp eax, dword ss:[ebp + 12] 73 15 ?? jae basic block L12 L11: 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 8b 4d fc ?? mov ecx, dword ss:[ebp + 0xfc<252,-4>] 8b 55 10 ?? mov edx, dword ss:[ebp + 0x10<16>] 8b 0c 8a ?? mov ecx, dword ds:[edx + ecx * 4] 89 0c 85 50 74 40 00 ?? mov dword ds:[0x00407450 + eax * 4], ecx eb dc ?? jmp 0x00402d74 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 40 ?? inc eax 89 45 fc ?? mov dword ss:[ebp + 0xfc<252,-4>], eax L12: 68 b4 5b 40 00 ?? push 0x00405bb4<"8t@"> e8 cf e4 ff ff ?? call function 0x00401271 L13: c9 ?? leave c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f21
___acrt_initialize
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f21
___scrt_stub_for_acrt_initialize
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f21
___vcrt_initialize
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f24
___acrt_thread_attach
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f24
___scrt_stub_for_acrt_thread_attach
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f24
___vcrt_thread_attach
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f27
___acrt_thread_detach
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f27
___scrt_stub_for_acrt_thread_detach
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f27
___vcrt_thread_detach
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f2a
___acrt_uninitialize
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f2a
___scrt_stub_for_acrt_uninitialize
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f2a
___vcrt_uninitialize
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f2d
___acrt_uninitialize_critical
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f2d
___scrt_stub_for_acrt_uninitialize_critical
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f2d
___vcrt_uninitialize_critical
0
L1: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f30
___scrt_stub_for_is_c_termination_complete
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f30
__is_c_termination_complete
0
L1: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f33
__filter_x86_sse2_floating_point_exception
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 83 3d 2c 74 40 00 01 ?? cmp dword ds:[0x0040742c], 1 7c 66 ?? jl basic block L15 L2: 81 7d 08 b4 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b4 74 09 ?? je basic block L4 L3: 81 7d 08 b5 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b5 75 54 ?? jne basic block L15 L4: 0f ae 5d fc ?? stmxcsr dword ss:[ebp + 0xfc<252,-4>] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 f0 3f ?? xor eax, 0x3f<63> a8 81 ?? test al, 0x81<129,-127> 74 3f ?? je basic block L14 L5: a9 04 02 00 00 ?? test eax, 0x00000204<516> 75 07 ?? jne basic block L7 L6: b8 8e 00 00 c0 ?? mov eax, 0xc000008e c9 ?? leave c3 ?? ret L7: a9 02 01 00 00 ?? test eax, 0x00000102<258> 74 2a ?? je basic block L14 L8: a9 08 04 00 00 ?? test eax, 0x00000408<1032> 75 07 ?? jne basic block L10 L9: b8 91 00 00 c0 ?? mov eax, 0xc0000091 c9 ?? leave c3 ?? ret L10: a9 10 08 00 00 ?? test eax, 0x00000810<2064> 75 07 ?? jne basic block L12 L11: b8 93 00 00 c0 ?? mov eax, 0xc0000093 c9 ?? leave c3 ?? ret L12: a9 20 10 00 00 ?? test eax, 0x00001020<4128> 75 0e ?? jne basic block L15 L13: b8 8f 00 00 c0 ?? mov eax, 0xc000008f c9 ?? leave c3 ?? ret L14: b8 90 00 00 c0 ?? mov eax, 0xc0000090 c9 ?? leave c3 ?? ret L15: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] c9 ?? leave c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex2.exe
0x402f33
__filter_x86_sse2_floating_point_exception_default
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 83 3d 2c 74 40 00 01 ?? cmp dword ds:[0x0040742c], 1 7c 66 ?? jl basic block L15 L2: 81 7d 08 b4 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b4 74 09 ?? je basic block L4 L3: 81 7d 08 b5 02 00 c0 ?? cmp dword ss:[ebp + 8], 0xc00002b5 75 54 ?? jne basic block L15 L4: 0f ae 5d fc ?? stmxcsr dword ss:[ebp + 0xfc<252,-4>] 8b 45 fc ?? mov eax, dword ss:[ebp + 0xfc<252,-4>] 83 f0 3f ?? xor eax, 0x3f<63> a8 81 ?? test al, 0x81<129,-127> 74 3f ?? je basic block L14 L5: a9 04 02 00 00 ?? test eax, 0x00000204<516> 75 07 ?? jne basic block L7 L6: b8 8e 00 00 c0 ?? mov eax, 0xc000008e c9 ?? leave c3 ?? ret L7: a9 02 01 00 00 ?? test eax, 0x00000102<258> 74 2a ?? je basic block L14 L8: a9 08 04 00 00 ?? test eax, 0x00000408<1032> 75 07 ?? jne basic block L10 L9: b8 91 00 00 c0 ?? mov eax, 0xc0000091 c9 ?? leave c3 ?? ret L10: a9 10 08 00 00 ?? test eax, 0x00000810<2064> 75 07 ?? jne basic block L12 L11: b8 93 00 00 c0 ?? mov eax, 0xc0000093 c9 ?? leave c3 ?? ret L12: a9 20 10 00 00 ?? test eax, 0x00001020<4128> 75 0e ?? jne basic block L15 L13: b8 8f 00 00 c0 ?? mov eax, 0xc000008f c9 ?? leave c3 ?? ret L14: b8 90 00 00 c0 ?? mov eax, 0xc0000090 c9 ?? leave c3 ?? ret L15: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] c9 ?? leave c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x4014f0
_main
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 51 ?? push ecx 56 ?? push esi 57 ?? push edi 6a 1c ?? push 0x1c<28> e8 b7 fb ff ff ?? call function 0x004010b4 L2: 8b f8 ?? mov edi, eax 83 c4 04 ?? add esp, 4 89 7d fc ?? mov dword ss:[ebp + 0xfc<252,-4>], edi 85 ff ?? test edi, edi 74 4e ?? je basic block L7 L3: c7 07 01 00 00 00 ?? mov dword ds:[edi], 1 c6 47 04 61 ?? mov byte ds:[edi + 4], 0x61<97> c7 47 08 ff ff ff ff ?? mov dword ds:[edi + 8], 0xffffffff<4294967295,-1> c7 47 0c 9c ff ff ff ?? mov dword ds:[edi + 12], 0xffffff9c<4294967196,-100> c6 47 10 41 ?? mov byte ds:[edi + 0x10<16>], 0x41<65> c7 47 14 9c ff ff ff ?? mov dword ds:[edi + 0x14<20>], 0xffffff9c<4294967196,-100> ff 15 1c 82 40 00 ?? call dword ds:[0x0040821c] L4: 99 ?? cdq b9 0a 00 00 00 ?? mov ecx, 10 f7 f9 ?? idiv ecx 85 d2 ?? test edx, edx 74 0b ?? je basic block L6 L5: 0f be 4f 04 ?? movsx ecx, byte ds:[edi + 4] 03 0f ?? add ecx, dword ds:[edi] 89 4f 18 ?? mov dword ds:[edi + 0x18<24>], ecx eb 10 ?? jmp basic block L8 L6: 0f be 47 10 ?? movsx eax, byte ds:[edi + 0x10<16>] 8b 4f 0c ?? mov ecx, dword ds:[edi + 12] 2b c8 ?? sub ecx, eax 89 4f 18 ?? mov dword ds:[edi + 0x18<24>], ecx eb 02 ?? jmp basic block L8 L7: 33 ff ?? xor edi, edi L8: 0f be 77 04 ?? movsx esi, byte ds:[edi + 4] 03 37 ?? add esi, dword ds:[edi] 6a 0c ?? push 12 57 ?? push edi e8 e9 fa ff ff ?? call function 0x00401050 L9: 83 c4 08 ?? add esp, 8 8b c6 ?? mov eax, esi 5f ?? pop edi 5e ?? pop esi 8b e5 ?? mov esp, ebp 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401592
??2@YAPAXI@Z
0
L1: e9 e6 08 00 00 ?? jmp function 0x00401b48 L2: 55 ?? push ebp 8b ec ?? mov ebp, esp eb 0d ?? jmp basic block L5 L3: ff 75 08 ?? push dword ss:[ebp + 8] e8 a0 18 00 00 ?? call function 0x00402e3f L4: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 0f ?? je basic block L8 L5: ff 75 08 ?? push dword ss:[ebp + 8] e8 99 18 00 00 ?? call function 0x00402e45 L6: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 e6 ?? je basic block L3 L7: 5d ?? pop ebp c3 ?? ret L8: 83 7d 08 ff ?? cmp dword ss:[ebp + 8], 0xff<255,-1> 0f 84 a0 fc ff ff ?? je basic block L1 L9: e9 ed fa ff ff ?? jmp 0x004010af e9 70 0a 00 00 ?? jmp function 0x00401b24
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x4015ce
??3@YAXPAXI@Z
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp ff 75 08 ?? push dword ss:[ebp + 8] e8 95 fa ff ff ?? call function 0x0040106e L2: 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x4015df
pre_c_initialization
0
L1: 56 ?? push esi 6a 01 ?? push 1 e8 6a 18 00 00 ?? call function 0x00402e51 L2: e8 b4 fa ff ff ?? call function 0x004010a0 L3: 50 ?? push eax e8 95 18 00 00 ?? call function 0x00402e87 L4: e8 e0 fa ff ff ?? call function 0x004010d7 L5: 8b f0 ?? mov esi, eax e8 b9 18 00 00 ?? call function 0x00402eb7 L6: 6a 01 ?? push 1 89 30 ?? mov dword ds:[eax], esi e8 e4 fa ff ff ?? call function 0x004010eb L7: 83 c4 0c ?? add esp, 12 5e ?? pop esi 84 c0 ?? test al, al 74 73 ?? je basic block L30 L8: db e2 ?? fnclex e8 ef f9 ff ff ?? call function 0x00401005 L9: 68 1d 11 40 00 ?? push 0x0040111d e8 20 fb ff ff ?? call function 0x00401140 L10: e8 a2 fb ff ff ?? call function 0x004011c7 L11: 50 ?? push eax e8 32 18 00 00 ?? call function 0x00402e5d L12: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 75 51 ?? jne basic block L30 L13: e8 33 fa ff ff ?? call function 0x00401069 L14: e8 19 fb ff ff ?? call function 0x00401154 L15: 85 c0 ?? test eax, eax 74 0b ?? je basic block L18 L16: 68 c3 10 40 00 ?? push 0x004010c3 e8 0e 18 00 00 ?? call function 0x00402e57 L17: 59 ?? pop ecx L18: e8 04 fc ff ff ?? call function 0x00401253 L19: e8 d4 f9 ff ff ?? call function 0x00401028 L20: e8 cd fb ff ff ?? call function 0x00401226 L21: e8 50 fb ff ff ?? call function 0x004011ae L22: 50 ?? push eax e8 47 18 00 00 ?? call function 0x00402eab L23: 59 ?? pop ecx e8 9e fb ff ff ?? call function 0x00401208 L24: 84 c0 ?? test al, al 74 05 ?? je basic block L26 L25: e8 f0 17 00 00 ?? call function 0x00402e63 L26: e8 3b fb ff ff ?? call function 0x004011b3 L27: e8 e1 fa ff ff ?? call function 0x0040115e L28: 85 c0 ?? test eax, eax 75 01 ?? jne basic block L30 L29: c3 ?? ret L30: 6a 07 ?? push 7 e8 ad fa ff ff ?? call function 0x00401136 L31: cc ?? int3 L32: cc ?? int3 L33: cc ?? int3 L34: cc ?? int3 L35: cc ?? int3 L36: cc ?? int3 L37: cc ?? int3 L38: cc ?? int3 L39: cc ?? int3 L40: cc ?? int3 L41: cc ?? int3 L42: cc ?? int3 L43: cc ?? int3 L44: cc ?? int3 L45: cc ?? int3 L46: cc ?? int3 L47: cc ?? int3 L48: cc ?? int3 L49: cc ?? int3 L50: cc ?? int3 L51: cc ?? int3 L52: cc ?? int3 L53: cc ?? int3 L54: cc ?? int3 L55: cc ?? int3 L56: cc ?? int3 L57: cc ?? int3 L58: cc ?? int3 L59: cc ?? int3 L60: cc ?? int3 L61: cc ?? int3 L62: cc ?? int3 L63: cc ?? int3 L64: cc ?? int3 L65: cc ?? int3 L66: cc ?? int3 L67: cc ?? int3 L68: cc ?? int3 L69: cc ?? int3 L70: cc ?? int3 L71: cc ?? int3 L72: cc ?? int3 L73: cc ?? int3
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x4016b4
post_pgo_initialization
0
L1: e8 50 fa ff ff ?? call function 0x00401109 L2: 33 c0 ?? xor eax, eax c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x4016be
pre_cpp_initialization
0
L1: e8 68 fb ff ff ?? call function 0x0040122b L2: e8 37 fa ff ff ?? call function 0x004010ff L3: 50 ?? push eax e8 e3 17 00 00 ?? call function 0x00402eb1 L4: 59 ?? pop ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x4016d4
__scrt_common_main
0
L1: e8 89 fb ff ff ?? call function 0x00401262 L2: e9 02 00 00 00 ?? jmp function 0x004016e0
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x4016e0
__scrt_common_main_seh
0
L1: 6a 14 ?? push 0x14<20> 68 d0 69 40 00 ?? push 0x004069d0 e8 aa f9 ff ff ?? call function 0x00401096 L2: 6a 01 ?? push 1 e8 e8 fa ff ff ?? call function 0x004011db L3: 59 ?? pop ecx 84 c0 ?? test al, al 0f 84 50 01 00 00 ?? je basic block L44 L4: 32 db ?? xor bl, bl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 e8 f9 fa ff ff ?? call function 0x00401203 L5: 88 45 dc ?? mov byte ss:[ebp + 0xdc<220,-36>], al a1 c8 73 40 00 ?? mov eax, dword ds:[0x004073c8] 33 c9 ?? xor ecx, ecx 41 ?? inc ecx 3b c1 ?? cmp eax, ecx 0f 84 2f 01 00 00 ?? je basic block L44 L6: 85 c0 ?? test eax, eax 75 49 ?? jne basic block L12 L7: 89 0d c8 73 40 00 ?? mov dword ds:[0x004073c8], ecx 68 18 56 40 00 ?? push 0x00405618 68 0c 53 40 00 ?? push 0x0040530c e8 3f 17 00 00 ?? call function 0x00402e75 L8: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 74 11 ?? je basic block L10 L9: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> b8 ff 00 00 00 ?? mov eax, 0x000000ff<255> e9 ef 00 00 00 ?? jmp basic block L43 L10: 68 08 52 40 00 ?? push 0x00405208 68 00 50 40 00 ?? push 0x00405000 e8 13 17 00 00 ?? call function 0x00402e6f L11: 59 ?? pop ecx 59 ?? pop ecx c7 05 c8 73 40 00 02 00 ?? mov dword ds:[0x004073c8], 2 00 00 eb 05 ?? jmp basic block L13 L12: 8a d9 ?? mov bl, cl 88 5d e7 ?? mov byte ss:[ebp + 0xe7<231,-25>], bl L13: ff 75 dc ?? push dword ss:[ebp + 0xdc<220,-36>] e8 97 f9 ff ff ?? call function 0x0040110e L14: 59 ?? pop ecx e8 b5 f8 ff ff ?? call function 0x00401032 L15: 8b f0 ?? mov esi, eax 33 ff ?? xor edi, edi 39 3e ?? cmp dword ds:[esi], edi 74 1b ?? je basic block L20 L16: 56 ?? push esi e8 51 f9 ff ff ?? call function 0x004010dc L17: 59 ?? pop ecx 84 c0 ?? test al, al 74 10 ?? je basic block L20 L18: 8b 36 ?? mov esi, dword ds:[esi] 57 ?? push edi 6a 02 ?? push 2 57 ?? push edi 8b ce ?? mov ecx, esi ff 15 00 90 40 00 ?? call dword ds:[0x00409000] L19: ff d6 ?? call esi L20: e8 7e f8 ff ff ?? call function 0x00401023 L21: 8b f0 ?? mov esi, eax 39 3e ?? cmp dword ds:[esi], edi 74 13 ?? je basic block L26 L22: 56 ?? push esi e8 2b f9 ff ff ?? call function 0x004010dc L23: 59 ?? pop ecx 84 c0 ?? test al, al 74 08 ?? je basic block L26 L24: ff 36 ?? push dword ds:[esi] e8 e8 16 00 00 ?? call function 0x00402ea5 L25: 59 ?? pop ecx L26: e8 a6 16 00 00 ?? call function 0x00402e69 L27: 8b f8 ?? mov edi, eax e8 c9 16 00 00 ?? call function 0x00402e93 L28: 8b 30 ?? mov esi, dword ds:[eax] e8 bc 16 00 00 ?? call function 0x00402e8d L29: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 1f fa ff ff ?? call function 0x004011f9 L30: 83 c4 0c ?? add esp, 12 8b f0 ?? mov esi, eax e8 29 fa ff ff ?? call function 0x0040120d L31: 84 c0 ?? test al, al 74 6b ?? je basic block L45 L32: 84 db ?? test bl, bl 75 05 ?? jne basic block L34 L33: e8 a8 16 00 00 ?? call function 0x00402e99 L34: 6a 00 ?? push 0 6a 01 ?? push 1 e8 19 f9 ff ff ?? call function 0x00401113 L35: 59 ?? pop ecx 59 ?? pop ecx c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b c6 ?? mov eax, esi eb 35 ?? jmp basic block L43 L36: 8b 4d ec ?? mov ecx, dword ss:[ebp + 0xec<236,-20>] 8b 01 ?? mov eax, dword ds:[ecx] 8b 00 ?? mov eax, dword ds:[eax] 89 45 e0 ?? mov dword ss:[ebp + 0xe0<224,-32>], eax 51 ?? push ecx 50 ?? push eax e8 33 16 00 00 ?? call function 0x00402e4b L37: 59 ?? pop ecx 59 ?? pop ecx c3 ?? ret L38: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] e8 ea f9 ff ff ?? call function 0x0040120d L39: 84 c0 ?? test al, al 74 32 ?? je basic block L46 L40: 80 7d e7 00 ?? cmp byte ss:[ebp + 0xe7<231,-25>], 0 75 05 ?? jne basic block L42 L41: e8 6d 16 00 00 ?? call function 0x00402e9f L42: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 8b 45 e0 ?? mov eax, dword ss:[ebp + 0xe0<224,-32>] L43: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx c9 ?? leave c3 ?? ret L44: 6a 07 ?? push 7 e8 e3 f8 ff ff ?? call function 0x00401136 L45: 56 ?? push esi e8 22 16 00 00 ?? call function 0x00402e7b L46: ff 75 e0 ?? push dword ss:[ebp + 0xe0<224,-32>] e8 20 16 00 00 ?? call function 0x00402e81 L47: cc ?? int3 L48: cc ?? int3 L49: cc ?? int3 L50: cc ?? int3 L51: cc ?? int3 L52: cc ?? int3 L53: cc ?? int3 L54: cc ?? int3 L55: cc ?? int3 L56: cc ?? int3 L57: cc ?? int3 L58: cc ?? int3 L59: cc ?? int3 L60: cc ?? int3 L61: cc ?? int3 L62: cc ?? int3 L63: cc ?? int3 L64: cc ?? int3 L65: cc ?? int3 L66: cc ?? int3 L67: cc ?? int3 L68: cc ?? int3 L69: cc ?? int3 L70: cc ?? int3 L71: cc ?? int3 L72: cc ?? int3 L73: cc ?? int3 L74: cc ?? int3 L75: cc ?? int3 L76: cc ?? int3 L77: cc ?? int3 L78: cc ?? int3 L79: cc ?? int3 L80: cc ?? int3 L81: cc ?? int3 L82: cc ?? int3 L83: cc ?? int3 L84: cc ?? int3 L85: cc ?? int3 L86: cc ?? int3 L87: cc ?? int3 L88: cc ?? int3 L89: cc ?? int3 L90: cc ?? int3 L91: cc ?? int3 L92: cc ?? int3 L93: cc ?? int3 L94: cc ?? int3 L95: cc ?? int3 L96: cc ?? int3 L97: cc ?? int3 L98: cc ?? int3 L99: cc ?? int3 L100: cc ?? int3 L101: cc ?? int3 L102: cc ?? int3 L103: cc ?? int3 L104: cc ?? int3 L105: cc ?? int3 L106: cc ?? int3 L107: cc ?? int3 L108: cc ?? int3 L109: cc ?? int3 L110: cc ?? int3 L111: cc ?? int3 L112: cc ?? int3 L113: cc ?? int3 L114: cc ?? int3 L115: cc ?? int3 L116: cc ?? int3 L117: cc ?? int3 L118: cc ?? int3 L119: cc ?? int3 L120: cc ?? int3 L121: cc ?? int3 L122: cc ?? int3 L123: cc ?? int3 L124: cc ?? int3 L125: cc ?? int3 L126: cc ?? int3 L127: cc ?? int3 L128: cc ?? int3 L129: cc ?? int3 L130: cc ?? int3 L131: cc ?? int3 L132: cc ?? int3 L133: cc ?? int3 L134: cc ?? int3 L135: cc ?? int3 L136: cc ?? int3 L137: cc ?? int3 L138: cc ?? int3 L139: cc ?? int3 L140: cc ?? int3 L141: cc ?? int3 L142: cc ?? int3 L143: cc ?? int3 L144: e8 00 f9 ff ff ?? call function 0x004011c7 L145: 50 ?? push eax e8 90 15 00 00 ?? call function 0x00402e5d L146: 59 ?? pop ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x4018d7
invoke_main
0
L1: 56 ?? push esi 57 ?? push edi e8 8b 15 00 00 ?? call function 0x00402e69 L2: 8b f8 ?? mov edi, eax e8 ae 15 00 00 ?? call function 0x00402e93 L3: 8b 30 ?? mov esi, dword ds:[eax] e8 a1 15 00 00 ?? call function 0x00402e8d L4: 57 ?? push edi 56 ?? push esi ff 30 ?? push dword ds:[eax] e8 04 f9 ff ff ?? call function 0x004011f9 L5: 83 c4 0c ?? add esp, 12 5f ?? pop edi 5e ?? pop esi c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401934
_mainCRTStartup
0
L1: e8 29 f9 ff ff ?? call function 0x00401262 L2: e9 a2 fd ff ff ?? jmp function 0x004016e0
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401940
??0bad_alloc@std@@AAE@QBD@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 61 04 00 ?? and dword ds:[ecx + 4], 0 83 61 08 00 ?? and dword ds:[ecx + 8], 0 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx c7 01 5c 5b 40 00 ?? mov dword ds:[ecx], 0x00405b5c 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401964
??0bad_alloc@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi ff 75 08 ?? push dword ss:[ebp + 8] 8b f1 ?? mov esi, ecx e8 0f f8 ff ff ?? call function 0x00401181 L2: c7 06 5c 5b 40 00 ?? mov dword ds:[esi], 0x00405b5c 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401985
??0bad_alloc@std@@QAE@XZ
1
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0 8b c1 ?? mov eax, ecx 83 61 08 00 ?? and dword ds:[ecx + 8], 0 c7 41 04 68 5b 40 00 ?? mov dword ds:[ecx + 4], 0x00405b68<"bad allocation"> c7 01 5c 5b 40 00 ?? mov dword ds:[ecx], 0x00405b5c c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x4019a3
??0bad_array_new_length@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi ff 75 08 ?? push dword ss:[ebp + 8] 8b f1 ?? mov esi, ecx e8 d0 f7 ff ff ?? call function 0x00401181 L2: c7 06 80 5b 40 00 ?? mov dword ds:[esi], 0x00405b80 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x4019c4
??0bad_array_new_length@std@@QAE@XZ
1
L1: 83 61 04 00 ?? and dword ds:[ecx + 4], 0 8b c1 ?? mov eax, ecx 83 61 08 00 ?? and dword ds:[ecx + 8], 0 c7 41 04 8c 5b 40 00 ?? mov dword ds:[ecx + 4], 0x00405b8c<"bad array new length"> c7 01 80 5b 40 00 ?? mov dword ds:[ecx], 0x00405b80 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x4019e2
??0exception@std@@QAE@ABV01@@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 5b 40 00 ?? mov dword ds:[esi], 0x00405b34 83 20 00 ?? and dword ds:[eax], 0 83 60 04 00 ?? and dword ds:[eax + 4], 0 50 ?? push eax 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 83 c0 04 ?? add eax, 4 50 ?? push eax e8 04 14 00 00 ?? call function 0x00402e09 L2: 59 ?? pop ecx 59 ?? pop ecx 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401a19
??0exception@std@@QAE@QBDH@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] c7 01 34 5b 40 00 ?? mov dword ds:[ecx], 0x00405b34 83 61 04 00 ?? and dword ds:[ecx + 4], 0 83 61 08 00 ?? and dword ds:[ecx + 8], 0 89 41 04 ?? mov dword ds:[ecx + 4], eax 8b c1 ?? mov eax, ecx 5d ?? pop ebp c2 08 00 ?? ret 8
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401a3d
??1bad_alloc@std@@UAE@XZ
1
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 34 5b 40 00 ?? mov dword ds:[ecx], 0x00405b34 50 ?? push eax e8 c3 13 00 00 ?? call function 0x00402e0f L2: 59 ?? pop ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401a52
??1bad_array_new_length@std@@UAE@XZ
1
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 34 5b 40 00 ?? mov dword ds:[ecx], 0x00405b34 50 ?? push eax e8 ae 13 00 00 ?? call function 0x00402e0f L2: 59 ?? pop ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401a67
??1exception@std@@UAE@XZ
1
L1: 8d 41 04 ?? lea eax, ds:[ecx + 4] c7 01 34 5b 40 00 ?? mov dword ds:[ecx], 0x00405b34 50 ?? push eax e8 99 13 00 00 ?? call function 0x00402e0f L2: 59 ?? pop ecx c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401a7c
??_Ebad_alloc@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 5b 40 00 ?? mov dword ds:[esi], 0x00405b34 50 ?? push eax e8 7e 13 00 00 ?? call function 0x00402e0f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 b0 f5 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401a7c
??_Gbad_alloc@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 5b 40 00 ?? mov dword ds:[esi], 0x00405b34 50 ?? push eax e8 7e 13 00 00 ?? call function 0x00402e0f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 b0 f5 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401ab4
??_Ebad_array_new_length@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 5b 40 00 ?? mov dword ds:[esi], 0x00405b34 50 ?? push eax e8 46 13 00 00 ?? call function 0x00402e0f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 78 f5 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401ab4
??_Gbad_array_new_length@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 5b 40 00 ?? mov dword ds:[esi], 0x00405b34 50 ?? push eax e8 46 13 00 00 ?? call function 0x00402e0f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 78 f5 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401aec
??_Eexception@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 5b 40 00 ?? mov dword ds:[esi], 0x00405b34 50 ?? push eax e8 0e 13 00 00 ?? call function 0x00402e0f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 40 f5 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401aec
??_Gexception@std@@UAEPAXI@Z
1
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 56 ?? push esi 8b f1 ?? mov esi, ecx 8d 46 04 ?? lea eax, ds:[esi + 4] c7 06 34 5b 40 00 ?? mov dword ds:[esi], 0x00405b34 50 ?? push eax e8 0e 13 00 00 ?? call function 0x00402e0f L2: f6 45 08 01 ?? test byte ss:[ebp + 8], 1 59 ?? pop ecx 74 0a ?? je basic block L5 L3: 6a 0c ?? push 12 56 ?? push esi e8 40 f5 ff ff ?? call function 0x00401050 L4: 59 ?? pop ecx 59 ?? pop ecx L5: 8b c6 ?? mov eax, esi 5e ?? pop esi 5d ?? pop ebp c2 04 00 ?? ret 4
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401b24
?__scrt_throw_std_bad_alloc@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 45 f6 ff ff ?? call function 0x00401177 L2: 68 f0 69 40 00 ?? push 0x004069f0 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 d5 12 00 00 ?? call function 0x00402e15 L3: cc ?? int3 L4: cc ?? int3 L5: cc ?? int3 L6: cc ?? int3 L7: cc ?? int3 L8: cc ?? int3 L9: cc ?? int3 L10: cc ?? int3
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401b48
?__scrt_throw_std_bad_array_new_length@@YAXXZ
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 ec 0c ?? sub esp, 12 8d 4d f4 ?? lea ecx, ss:[ebp + 0xf4<244,-12>] e8 ff f4 ff ff ?? call function 0x00401055 L2: 68 54 6a 40 00 ?? push 0x00406a54 8d 45 f4 ?? lea eax, ss:[ebp + 0xf4<244,-12>] 50 ?? push eax e8 b1 12 00 00 ?? call function 0x00402e15 L3: cc ?? int3 L4: cc ?? int3 L5: cc ?? int3 L6: cc ?? int3 L7: cc ?? int3 L8: cc ?? int3 L9: cc ?? int3 L10: cc ?? int3
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401b6c
?what@exception@std@@UBEPBDXZ
1
L1: 8b 41 04 ?? mov eax, dword ds:[ecx + 4] 85 c0 ?? test eax, eax 75 05 ?? jne basic block L3 L2: b8 40 5b 40 00 ?? mov eax, 0x00405b40<"Unknown exception"> L3: c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401b7c
??3@YAXPAX@Z
0
L1: e9 3c 13 00 00 ?? jmp 0x00402ebd ff 25 c0 80 40 00 ?? jmp dword ds:[0x004080c0]
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401b81
find_pe_section
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 56 ?? push esi 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 03 c8 ?? add ecx, eax 0f b7 41 14 ?? movzx eax, word ds:[ecx + 0x14<20>] 8d 51 18 ?? lea edx, ds:[ecx + 0x18<24>] 03 d0 ?? add edx, eax 0f b7 41 06 ?? movzx eax, word ds:[ecx + 6] 6b f0 28 ?? imul esi, eax, 0x28<40> 03 f2 ?? add esi, edx 3b d6 ?? cmp edx, esi 74 19 ?? je basic block L6 L2: 8b 4d 0c ?? mov ecx, dword ss:[ebp + 12] L3: 3b 4a 0c ?? cmp ecx, dword ds:[edx + 12] 72 0a ?? jb basic block L5 L4: 8b 42 08 ?? mov eax, dword ds:[edx + 8] 03 42 0c ?? add eax, dword ds:[edx + 12] 3b c8 ?? cmp ecx, eax 72 0c ?? jb basic block L8 L5: 83 c2 28 ?? add edx, 0x28<40> 3b d6 ?? cmp edx, esi 75 ea ?? jne basic block L3 L6: 33 c0 ?? xor eax, eax L7: 5e ?? pop esi 5d ?? pop ebp c3 ?? ret L8: 8b c2 ?? mov eax, edx eb f9 ?? jmp basic block L7
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401bd6
is_potentially_valid_image_base
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 8b 45 08 ?? mov eax, dword ss:[ebp + 8] 85 c0 ?? test eax, eax 74 25 ?? je basic block L5 L2: b9 4d 5a 00 00 ?? mov ecx, 0x00005a4d<23117> 66 39 08 ?? cmp word ds:[eax], cx 75 1b ?? jne basic block L5 L3: 8b 48 3c ?? mov ecx, dword ds:[eax + 0x3c<60>] 03 c8 ?? add ecx, eax 81 39 50 45 00 00 ?? cmp dword ds:[ecx], 0x00004550<17744> 75 0e ?? jne basic block L5 L4: b8 0b 01 00 00 ?? mov eax, 0x0000010b<267> 66 39 41 18 ?? cmp word ds:[ecx + 0x18<24>], ax 0f 94 c0 ?? sete al 5d ?? pop ebp c3 ?? ret L5: 32 c0 ?? xor al, al 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401c15
_NtCurrentTeb
0
L1: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401c1c
___scrt_acquire_startup_lock
0
L1: 56 ?? push esi e8 00 f5 ff ff ?? call function 0x00401122 L2: 85 c0 ?? test eax, eax 74 20 ?? je basic block L6 L3: 64 a1 18 00 00 00 ?? mov eax, dword fs:[0x00000018<24>] be cc 73 40 00 ?? mov esi, 0x004073cc 8b 50 04 ?? mov edx, dword ds:[eax + 4] eb 04 ?? jmp basic block L5 L4: 3b d0 ?? cmp edx, eax 74 10 ?? je basic block L7 L5: 33 c0 ?? xor eax, eax 8b ca ?? mov ecx, edx f0 0f b1 0e ?? lock cmpxchg dword ds:[esi], ecx 85 c0 ?? test eax, eax 75 f0 ?? jne basic block L4 L6: 32 c0 ?? xor al, al 5e ?? pop esi c3 ?? ret L7: b0 01 ?? mov al, 1 5e ?? pop esi c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401c5a
___scrt_dllmain_after_initialize_c
0
L1: e8 c3 f4 ff ff ?? call function 0x00401122 L2: 85 c0 ?? test eax, eax 74 07 ?? je basic block L5 L3: e8 bf f4 ff ff ?? call function 0x00401127 L4: eb 18 ?? jmp basic block L10 L5: e8 58 f5 ff ff ?? call function 0x004011c7 L6: 50 ?? push eax e8 e8 11 00 00 ?? call function 0x00402e5d L7: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 03 ?? je basic block L9 L8: 32 c0 ?? xor al, al c3 ?? ret L9: e8 e1 11 00 00 ?? call function 0x00402e63 L10: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401c8f
___scrt_dllmain_before_initialize_c
0
L1: 6a 00 ?? push 0 e8 55 f4 ff ff ?? call function 0x004010eb L2: 84 c0 ?? test al, al 59 ?? pop ecx 0f 95 c0 ?? setne al c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401ca0
___scrt_dllmain_crt_thread_attach
0
L1: e8 d7 f4 ff ff ?? call function 0x0040117c L2: 84 c0 ?? test al, al 75 03 ?? jne basic block L4 L3: 32 c0 ?? xor al, al c3 ?? ret L4: e8 f3 f4 ff ff ?? call function 0x004011a4 L5: 84 c0 ?? test al, al 75 07 ?? jne basic block L8 L6: e8 13 f4 ff ff ?? call function 0x004010cd L7: eb ed ?? jmp basic block L3 L8: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401cc6
___scrt_dllmain_crt_thread_detach
0
L1: e8 4d f4 ff ff ?? call function 0x00401118 L2: e8 fd f3 ff ff ?? call function 0x004010cd L3: b0 01 ?? mov al, 1 c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401cd6
___scrt_dllmain_exception_filter
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 44 f4 ff ff ?? call function 0x00401122 L2: 85 c0 ?? test eax, eax 75 19 ?? jne basic block L6 L3: 83 7d 0c 01 ?? cmp dword ss:[ebp + 12], 1 75 13 ?? jne basic block L6 L4: ff 75 10 ?? push dword ss:[ebp + 0x10<16>] 8b 4d 14 ?? mov ecx, dword ss:[ebp + 0x14<20>] 50 ?? push eax ff 75 08 ?? push dword ss:[ebp + 8] ff 15 00 90 40 00 ?? call dword ds:[0x00409000] L5: ff 55 14 ?? call dword ss:[ebp + 0x14<20>] L6: ff 75 1c ?? push dword ss:[ebp + 0x1c<28>] ff 75 18 ?? push dword ss:[ebp + 0x18<24>] e8 bd 11 00 00 ?? call function 0x00402ec3 L7: 59 ?? pop ecx 59 ?? pop ecx 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401d17
___scrt_dllmain_uninitialize_c
0
L1: e8 06 f4 ff ff ?? call function 0x00401122 L2: 85 c0 ?? test eax, eax 74 0c ?? je basic block L5 L3: 68 d4 73 40 00 ?? push 0x004073d4 e8 ab 11 00 00 ?? call function 0x00402ed5 L4: 59 ?? pop ecx c3 ?? ret L5: e8 0a f4 ff ff ?? call function 0x0040113b L6: 85 c0 ?? test eax, eax 0f 84 60 11 00 00 ?? je function 0x00402e99 L7: c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401d42
___scrt_dllmain_uninitialize_critical
0
L1: 6a 00 ?? push 0 e8 23 f5 ff ff ?? call function 0x0040126c L2: 59 ?? pop ecx e9 3c f4 ff ff ?? jmp 0x0040118b e9 bd 1d 00 00 ?? jmp function 0x00402f4d
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401d52
___scrt_initialize_crt
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 7d 08 00 ?? cmp dword ss:[ebp + 8], 0 75 07 ?? jne basic block L3 L2: c6 05 d0 73 40 00 01 ?? mov byte ds:[0x004073d0], 1 L3: e8 c0 f3 ff ff ?? call function 0x00401127 L4: e8 4c f4 ff ff ?? call function 0x004011b8 L5: 84 c0 ?? test al, al 75 04 ?? jne basic block L7 L6: 32 c0 ?? xor al, al 5d ?? pop ebp c3 ?? ret L7: e8 44 f4 ff ff ?? call function 0x004011bd L8: 84 c0 ?? test al, al 75 0a ?? jne basic block L11 L9: 6a 00 ?? push 0 e8 8b f2 ff ff ?? call function 0x0040100f L10: 59 ?? pop ecx eb e9 ?? jmp basic block L6 L11: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401d99
___scrt_initialize_onexit_tables
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 80 3d d1 73 40 00 00 ?? cmp byte ds:[0x004073d1], 0 74 04 ?? je basic block L3 L2: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret L3: 56 ?? push esi 8b 75 08 ?? mov esi, dword ss:[ebp + 8] 85 f6 ?? test esi, esi 74 05 ?? je basic block L5 L4: 83 fe 01 ?? cmp esi, 1 75 62 ?? jne basic block L16 L5: e8 67 f3 ff ff ?? call function 0x00401122 L6: 85 c0 ?? test eax, eax 74 26 ?? je basic block L13 L7: 85 f6 ?? test esi, esi 75 22 ?? jne basic block L13 L8: 68 d4 73 40 00 ?? push 0x004073d4 e8 fc 10 00 00 ?? call function 0x00402ec9 L9: 59 ?? pop ecx 85 c0 ?? test eax, eax 75 0f ?? jne basic block L12 L10: 68 e0 73 40 00 ?? push 0x004073e0 e8 ed 10 00 00 ?? call function 0x00402ec9 L11: 59 ?? pop ecx 85 c0 ?? test eax, eax 74 2b ?? je basic block L14 L12: 32 c0 ?? xor al, al eb 30 ?? jmp basic block L15 L13: 83 c9 ff ?? or ecx, 0xff<255,-1> 89 0d d4 73 40 00 ?? mov dword ds:[0x004073d4], ecx 89 0d d8 73 40 00 ?? mov dword ds:[0x004073d8], ecx 89 0d dc 73 40 00 ?? mov dword ds:[0x004073dc], ecx 89 0d e0 73 40 00 ?? mov dword ds:[0x004073e0], ecx 89 0d e4 73 40 00 ?? mov dword ds:[0x004073e4], ecx 89 0d e8 73 40 00 ?? mov dword ds:[0x004073e8], ecx L14: c6 05 d1 73 40 00 01 ?? mov byte ds:[0x004073d1], 1 b0 01 ?? mov al, 1 L15: 5e ?? pop esi 5d ?? pop ebp c3 ?? ret L16: 6a 05 ?? push 5 e8 17 f3 ff ff ?? call function 0x00401136 L17: cc ?? int3 L18: cc ?? int3 L19: cc ?? int3 L20: cc ?? int3 L21: cc ?? int3 L22: cc ?? int3 L23: cc ?? int3 L24: cc ?? int3 L25: cc ?? int3 L26: cc ?? int3 L27: cc ?? int3 L28: cc ?? int3 L29: cc ?? int3 L30: cc ?? int3 L31: cc ?? int3 L32: cc ?? int3 L33: cc ?? int3 L34: cc ?? int3 L35: cc ?? int3 L36: cc ?? int3 L37: cc ?? int3 L38: cc ?? int3 L39: cc ?? int3 L40: cc ?? int3 L41: cc ?? int3 L42: cc ?? int3 L43: cc ?? int3 L44: cc ?? int3 L45: cc ?? int3 L46: cc ?? int3 L47: cc ?? int3 L48: cc ?? int3 L49: cc ?? int3 L50: cc ?? int3
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401e41
___scrt_is_nonwritable_in_current_image
0
L1: 6a 08 ?? push 8 68 a0 6a 40 00 ?? push 0x00406aa0 e8 49 f2 ff ff ?? call function 0x00401096 L2: 83 65 fc 00 ?? and dword ss:[ebp + 0xfc<252,-4>], 0 b8 4d 5a 00 00 ?? mov eax, 0x00005a4d<23117> 66 39 05 00 00 40 00 ?? cmp word ds:[0x00400000], ax 75 5d ?? jne basic block L11 L3: a1 3c 00 40 00 ?? mov eax, dword ds:[0x0040003c] 81 b8 00 00 40 00 50 45 ?? cmp dword ds:[eax + 0x00400000], 0x00004550<17744> 00 00 75 4c ?? jne basic block L11 L4: b9 0b 01 00 00 ?? mov ecx, 0x0000010b<267> 66 39 88 18 00 40 00 ?? cmp word ds:[eax + 0x00400018<"@">], cx 75 3e ?? jne basic block L11 L5: 8b 45 08 ?? mov eax, dword ss:[ebp + 8] b9 00 00 40 00 ?? mov ecx, 0x00400000 2b c1 ?? sub eax, ecx 50 ?? push eax 51 ?? push ecx e8 f2 fc ff ff ?? call function 0x00401b81 L6: 59 ?? pop ecx 59 ?? pop ecx 85 c0 ?? test eax, eax 74 27 ?? je basic block L11 L7: 83 78 24 00 ?? cmp dword ds:[eax + 0x24<36>], 0 7c 21 ?? jl basic block L11 L8: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> b0 01 ?? mov al, 1 eb 1f ?? jmp basic block L12 L9: 8b 45 ec ?? mov eax, dword ss:[ebp + 0xec<236,-20>] 8b 00 ?? mov eax, dword ds:[eax] 33 c9 ?? xor ecx, ecx 81 38 05 00 00 c0 ?? cmp dword ds:[eax], 0xc0000005 0f 94 c1 ?? sete cl 8b c1 ?? mov eax, ecx c3 ?? ret L10: 8b 65 e8 ?? mov esp, dword ss:[ebp + 0xe8<232,-24>] L11: c7 45 fc fe ff ff ff ?? mov dword ss:[ebp + 0xfc<252,-4>], 0xfffffffe<4294967294,-2> 32 c0 ?? xor al, al L12: 8b 4d f0 ?? mov ecx, dword ss:[ebp + 0xf0<240,-16>] 64 89 0d 00 00 00 00 ?? mov dword fs:[0], ecx 59 ?? pop ecx 5f ?? pop edi 5e ?? pop esi 5b ?? pop ebx c9 ?? leave c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401efa
___scrt_release_startup_lock
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp e8 20 f2 ff ff ?? call function 0x00401122 L2: 85 c0 ?? test eax, eax 74 0f ?? je basic block L5 L3: 80 7d 08 00 ?? cmp byte ss:[ebp + 8], 0 75 09 ?? jne basic block L5 L4: 33 c0 ?? xor eax, eax b9 cc 73 40 00 ?? mov ecx, 0x004073cc 87 01 ?? xchg dword ds:[ecx], eax L5: 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401f1e
___scrt_uninitialize_crt
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 80 3d d0 73 40 00 00 ?? cmp byte ds:[0x004073d0], 0 74 06 ?? je basic block L3 L2: 80 7d 0c 00 ?? cmp byte ss:[ebp + 12], 0 75 12 ?? jne basic block L6 L3: ff 75 08 ?? push dword ss:[ebp + 8] e8 a9 f1 ff ff ?? call function 0x004010e1 L4: ff 75 08 ?? push dword ss:[ebp + 8] e8 cf f0 ff ff ?? call function 0x0040100f L5: 59 ?? pop ecx 59 ?? pop ecx L6: b0 01 ?? mov al, 1 5d ?? pop ebp c3 ?? ret
./vs2022/normal/RelWithDebInfo/ooex3.exe
0x401f50
__onexit
0
L1: 55 ?? push ebp 8b ec ?? mov ebp, esp 83 3d d4 73 40 00 ff ?? cmp dword ds:[0x004073d4], 0xff<255,-1> ff 75 08 ?? push dword ss:[ebp + 8] 75 07 ?? jne basic block L4 L2: e8 77 0f 00 00 ?? call function 0x00402edb L3: eb 0b ?? jmp basic block L6 L4: 68 d4 73 40 00 ?? push 0x004073d4 e8 5f 0f 00 00 ?? call function 0x00402ecf L5: 59 ?? pop ecx L6: f7 d8 ?? neg eax 59 ?? pop ecx 1b c0 ?? sbb eax, eax f7 d0 ?? not eax 23 45 08 ?? and eax, dword ss:[ebp + 8] 5d ?? pop ebp c3 ?? ret